Cacti is an open source operational monitoring and fault management framework.Affected versions are subject to a Stored Cross-Site-Scripting (XSS) Vulnerability allows an authenticated user to poison data. The vulnerability is found in `graphs_new.php`. Several validations are performed, but the `returnto` parameter is directly passed to `form_save_button`. In order to bypass this validation, returnto must contain `host.php`. This vulnerability has been addressed in version 1.2.25. Users are advised to upgrade. Users unable to update should manually filter HTML output.
Use CWE-79, Cacti vendor hub and Cacti product page to widen CVE-2023-39360 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2025-22604, CVE-2005-10004 and CVE-2025-24367 for nearby disclosures in the same product family.